2100+ Important Computer MCQs For Competitive Exams part-1 Solved MCQs

101.

In the right setting a thief will steal your information by simply watching what you type.

A. snagging
B. spying
C. social engineering
D. shoulder surfing
E. None of these
Answer» D. shoulder surfing
102.

A………..is a small program embedded inside of a GIF image.

A. web bug
B. cookie
C. spyware application
D. spam
E. None of these
Answer» A. web bug
103.

A hacker contacts you my phone or email and attempts to acquire your password

A. spoofing
B. phishing
C. spamming
D. bugging
E. None of these
Answer» B. phishing
104.

A hacker that changes or forges information in an electronic resource, is engaging in………

A. denial of service
B. sniffing
C. terrorism
D. data diddling
E. None of these
Answer» D. data diddling
105.

Hackers often gain entry to a network be pretending to be at a legitimate computer.

A. Spoofing
B. forging
C. IP spoofing
D. ID theft
E. None of these
Answer» C. IP spoofing
106.

The………..of a threat measures its potential impact on a system.

A. vulnerabilities
B. countermeasures
C. degree of harm
D. susceptibility
E. None of these
Answer» C. degree of harm
107.

The power level drops below 120V.

A. brownout
B. spike
C. blackout
D. surge
E. None of these
Answer» C. blackout
108.

Which of the following is NOT a Microsoft Internet tool or technology?

A. Dreamweaver
B. Silverlight
C. Internet Explorer
D. Expression Web
E. None of these
Answer» A. Dreamweaver
109.

A protocol used to control the secure sending of data on the internet is :

A. SMTP
B. HTTPS
C. TCP/IP
D. HTTP
E. None of these
Answer» B. HTTPS
110.

Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ………..

A. software suites
B. integrated software packages
C. software processing packages
D. personal information managers
E. None of these
Answer» A. software suites
111.

……………terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

A. Data
B. Sales
C. Query
D. Point-of-Sale (POS)
E. None of these
Answer» D. Point-of-Sale (POS)
112.

The OSI model is divided into …………processes called layers.

A. five
B. six
C. seven
D. eight
E. None of these
Answer» C. seven
113.

………..are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.

A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
E. None of these
Answer» B. Embedded computers
114.

In a ring topology, the computer in possession of the………can transmit data

A. packet
B. data
C. access method
D. token
E. None of these
Answer» D. token
115.

…………Viruses are often transmitted by a floppy disk left in the floppy drive

A. Trojan horse
B. Boot sector
C. Script
D. Logic bomb
E. None of these
Answer» B. Boot sector
116.

A database management system (DBMS) is a………..

A. hardware system used to create, maintain and provide controlled access to a database
B. hardware system used to create, maintain, and provide uncontrolled access to a database.
C. software system used to create, maintain, and provide uncontrolled access to a database.
D. software system used to create, maintain, and provide controlled access to a database.
E. None o these
Answer» D. software system used to create, maintain, and provide controlled access to a database.
117.

A Proxy server is used for which of the following?

A. To provide security against unauthorized users
B. To process client requests for web pages
C. To process client requests for database access
D. To provide TCP/IP
E. None of these
Answer» B. To process client requests for web pages
118.

……….are words that a programming language has set aside for its own use.

A. Control words
B. Reserved words
C. Control structures
D. Reserved keys
E. None of these
Answer» B. Reserved words
119.

What is the primary difference between a virus and a worm?

A. A worm has the ability to self-propagate from an infected user’s computer to other computers
B. A worm is usually written by a cracker : Script bunnies do not have the skills to develop worm program
C. A virus is very harmful to the computers it infects; a worm is not a serious a problem
D. Anti-virus software is effective in fighting viruses but not worms
E. None of these
Answer» C. A virus is very harmful to the computers it infects; a worm is not a serious a problem
120.

………..describe what is database fields.

A. Structures
B. Field markers
C. Field definition
D. Field names
E. None of these
Answer» D. Field names
121.

A goal of normalization is to………….

A. minimize the number of relationships
B. minimize the number of entities
C. minimize the number of tables
D. minimize the numbe of redundancy
E. None of these
Answer» D. minimize the numbe of redundancy
122.

A(n)………….uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.

A. command-based user interface
B. GUI
C. system utility
D. API
E. None of these
Answer» B. GUI
123.

Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is

A. Local area network
B. Modem
C. Base band networking
D. Broad band networking
E. None of these
Answer» D. Broad band networking
124.

‘ITS’ stands for

A. Intelligent Teaching Systems
B. International Tutoring Systems
C. Intelligent Tutoring Systems
D. All of these
E. None of these
Answer» C. Intelligent Tutoring Systems
125.

Any piece of equipment forming an interface to a data communication system is

A. DTE
B. DTA
C. CSA
D. DCA
E. None of these
Answer» B. DTA
126.

In the language of the computer profession, one thousand position of main storage is represented with the letter

A. K
B. L
C. M
D. C
E. None of these
Answer» A. K
127.

The control of the jobs running within a system is

A. Job monitoring
B. Job stream
C. Job min
D. Job step
E. None of these
Answer» A. Job monitoring
128.

The total number of messages handled by a computerized telephone system on a daily basis is an example of :

A. Frequency
B. Updating
C. Volume
D. All of these
E. None of these
Answer» D. All of these
129.

A device mounted on a communication satellite which receives, amplifies and re- transmits signals from earth station is

A. Track
B. Transponder
C. Transistor
D. Terminal
E. None of these
Answer» B. Transponder
130.

What is the acronym for Single In-Line Memory Module?

A. SIMM
B. SILMM
C. SM
D. SMM
E. None of these
Answer» A. SIMM
131.

Which type of processing that produces output results immediately after input data are entered into a computer system

A. Time-sharing
B. Interactive
C. Batch Processing
D. Real-time processing
E. None of these
Answer» B. Interactive
132.

A computer program that instructs other programs to perform a particular type of operation is

A. System software
B. Application program
C. Compiler
D. Interpreter
E. None of these
Answer» A. System software
133.

The provides a path between the CPU and peripheral devices, which are connected via interface cards

A. computer
B. expansion bus
C. memory
D. CPU
E. None of these
Answer» B. expansion bus
134.

Programs prepared by an outside supplier & provided to a user in a machine readable form is known as

A. Utility program
B. Canned program
C. Application program
D. Application software
E. None of these
Answer» B. Canned program
135.

Pictures or drawings, typically displayed on a VDU to allow users to select program options is called

A. HIPO charts
B. Icons
C. Graphics
D. Network
E. None of these
Answer» B. Icons
136.

The pieces of equipment which are attached to the CPU of a computer and which it can access are called

A. output devices
B. control units
C. hardware
D. disk drive
E. peripherals
Answer» E. peripherals
137.

A factor which might cause an individual to consider using a computer in criminal activities is :

A. The computer’s access to large sums of money
B. The speed with which the crime can be accomplished
C. EFTS (Electronic Funds Transfer System)
D. All the these
E. None of these
Answer» D. All the these
138.

The Secure Electronic Transaction (SET) specification

A. is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
B. provides private-key encryption of all data that passes between a client and a server
C. allows users to choose an encryption scheme for the data that passes between a client and a server
D. uses a public-key encryption to secure credit-card transaction systems
E. None of these
Answer» D. uses a public-key encryption to secure credit-card transaction systems
139.

‘DOS’ floppy disk does not have                  

A. A Boot Record
B. A File Allocation Table
C. A Root Directory
D. Virtual Memory
E. BIOS
Answer» E. BIOS
140.

All the information collected during database development is stored in a_                 

A. repository
B. data warehouse
C. RAD
D. CASE
E. None of these
Answer» B. data warehouse
141.

The…………component is used by the data analyst to create the queries that access the database.

A. data extraction
B. end-user query tool
C. end-user presentation tool
D. data store
E. None of these
Answer» B. end-user query tool
142.

A polymorphic virus

A. modifies its program code each time it attaches itself to another program or file
B. is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.
C. a malicious-logic program that hides within or looks like a legitimate program
D. infects a program file, but still reports the size and creation date of the original uninfected program
E. None of these
Answer» A. modifies its program code each time it attaches itself to another program or file
143.

Microwave transmission is used in environments where installing physical transmission media is _           

A. difficult or impossible and where line-of- sight transmission is unavailable
B. easy or promising and where line-of-sight transmission is unavailable
C. difficult or impossible and where line-of- sight transmission is available
D. easy or promising and where line-of-sight transmission is available
E. None of these
Answer» D. easy or promising and where line-of-sight transmission is available
144.

Which is NOT a good Web security strategy?

A. Restrict access to the Web server; keep a minimum number of ports open
B. Limit the users who can load software, edit or add files.
C. Add demo programs, so users can test system without accessing production data.
D. Remove unnecessary compilers and interpreters
E. None of these
Answer» D. Remove unnecessary compilers and interpreters
145.

The word FTP stands for                      

A. File Translate Protocol
B. File Transit Protocol
C. File Typing Protocol
D. File Transfer Protocol
E. None of these
Answer» D. File Transfer Protocol
146.

This…………tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.

A. Client
B. Applications/Web server
C. Enterprise Server
D. DBA
E. None of these
Answer» A. Client
147.

RSA is

A. Symmetric Cryptosystem
B. Asymmetric Cryptosystem
C. Block Cypher
D. Digital Signature
E. None of these
Answer» D. Digital Signature
148.

A DVD-RAM is similar to a …………except it has storage capacities upto 5.2 GB.

A. CD-R
B. floppy disk
C. CD-RW
D. hard disk
E. None of these
Answer» C. CD-RW
149.

How is power supplied to a low-power USB device?

A. Through a power cable
B. From an external power supply
C. Directly from the computer’s power supply
D. Through the USB cable
E. None of these
Answer» D. Through the USB cable
150.

The………data mining techniques derives rules from real-world case examples.

A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning
E. None of these
Answer» C. Neural nets
151.

Which of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?

A. Servlet Request
B. Http Servlet Request
C. Servlet Response
D. Http Servlet Response
E. None of these
Answer» C. Servlet Response
152.

Graphical diagrams used to represent different multiple perspectives of a system include_                 

A. use-case, class, and state diagrams
B. state, interaction, derivative diagrams
C. interaction, relationship, and class diagrams
D. deployment, relationship, and use-case diagrams
E. None of these
Answer» A. use-case, class, and state diagrams
153.

Database redesign is not terribly difficult if the                    

A. database is structured
B. database is well-designed
C. database has no data
D. database is relatively small
E. database is relatively large
Answer» E. database is relatively large
154.

Which of the following are normally used to initialize a computer system’s hardware?

A. Bootstrap memory
B. Volatile memory
C. External mass memory
D. Static memory
E. Random access memory
Answer» A. Bootstrap memory
155.

If you wanted to locate the hardware address of a local device, which protocol would you use?

A. ARP
B. RARP
C. ICMP
D. PING
E. PONG
Answer» A. ARP
156.

What is Internet 2?

A. A new type of cabling system for Wide Area Networks
B. A second local area network that can connect with another online LAN to share access
C. A new standard for Internet browsers
D. An association to develop advanced Internet technology
E. None of these
Answer» D. An association to develop advanced Internet technology
157.

While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?

A. Visit Google’s cached page to view the older copy.
B. Forget about it, as there is no way to find this information
C. Visit a partner site of the organization to see if it is there.
D. Use the wayback machine.
E. None of these
Answer» C. Visit a partner site of the organization to see if it is there.
158.

Which kind of lock includes a keypad that can be used to control access into areas?

A. Cipher
B. Warded
C. Device
D. Tumbler
E. Typelock
Answer» D. Tumbler
159.

Which is not a factor when categorizing a computer?

A. Speed of the output device
B. Amount of main memory the CPU can use
C. Cost of the system
D. Capacity of the hard disk
E. Where it was purchased
Answer» E. Where it was purchased
160.

Which of the following terms is the most closely related to main memory?

A. nonvolatile
B. permanent
C. control unit
D. temporary
E. None of these
Answer» D. temporary
161.

Which of the following is not a factor affecting the processing capability or performance of a PC system?

A. The clock speed of the microprocessor
B. The revolutions per minute of the printer disk
C. The primary storage capacity of the processor
D. The built-in instruction set available to the microprocessor
E. None of these
Answer» B. The revolutions per minute of the printer disk
162.

What is the standard code the computer industry created to represent characters?

A. DASI
B. ASSH
C. ASCII
D. BASCII
E. EPROM
Answer» C. ASCII
163.

Primary storage is………..as compared to secondary storage :

A. Slow and inexpensive
B. Fast and inexpensive
C. Fast and expensive
D. Slow and expensive
E. None of these
Answer» C. Fast and expensive
164.

Offline device is :

A. a device which is not connected to CPU
B. a device which i connected to CPU
C. a direct access storage device
D. an I/O device
E. None of these
Answer» A. a device which is not connected to CPU
165.

The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language :

A. COBOL
B. ADA
C. PASCAL
D. BASIC
E. None of these
Answer» D. BASIC
166.

Which of the following is a communication network that is devoted to carrying computer information :

A. Data Point
B. Data Module
C. Data network
D. Data Pack
E. None of these
Answer» C. Data network
167.

A half byte is known as :

A. Data
B. Bit
C. Half byte
D. Nibble
E. None of these
Answer» D. Nibble
168.

With respect to a network interface card the term 10/100 refers to:

A. protocol speed
B. a fiber speed
C. megabits per seconds
D. minimum and maximum server speed
E. None of these
Answer» C. megabits per seconds
169.

A hard disk is divided into tracks which are further subdivided into :

A. clusters
B. sectors
C. vectors
D. heads
E. None of these
Answer» B. sectors
170.

Which standard govern parallel communications?

A. RS232
B. RS-232a
C. CAT 5
D. IEEE 1284
E. None of these
Answer» D. IEEE 1284
171.

Which peripheral port provides the FASTEST throughput to laser printers?

A. RS-232
B. SCSI
C. Parallel
D. Serial
E. None of these
Answer» C. Parallel
172.

Resistance is measured in?

A. Volts
B. Amps
C. Watts
D. Ohms
E. None of these
Answer» D. Ohms
173.

In Inkjet technology the droplets of ink are deflected by?

A. multi directional nozzles
B. electronically charged plates
C. high pressure plates
D. electro static absorbtion
E. None of these
Answer» A. multi directional nozzles
174.

Which provides the fastest access to large video files?

A. Optical drives
B. IDE hard drives
C. SCSI hard drives
D. EIDE hard drives
E. None of these
Answer» C. SCSI hard drives
175.

Primary memory stores :

A. Data alone
B. Programs alone
C. Results alone
D. All of these
E. None of these
Answer» D. All of these
176.

You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first :

A. cable sequence
B. jumpers on the hard drive
C. drivers that need to be loaded
D. hard drive manufacturer web site information
E. None of these
Answer» B. jumpers on the hard drive
177.

What’s the best way to protect your hard drive data?

A. regular backups
B. periodically defrag it
C. run chkdsk at least once a week
D. run scandisk at least once a week
E. run a regular diagnostic
Answer» A. regular backups
178.

Laser Jet printer speeds are measured in pages per minute (ppm) what do we use to measure dot-matrix printers?

A. lines per inch
B. lines per sheet
C. characters per inch
D. characters per second
E. None of these
Answer» D. characters per second
179.

A modem could be attached to which port?

A. Parallel port
B. ASYNC port
C. Keyboard connector
D. Video port
E. None of these
Answer» A. Parallel port
180.

You get a CMOS checksum error during bootup. What is most likely the cause?

A. power supply is bad
B. BIOS needs updating
C. CMOS battery is nearing end of life
D. hard drive types are incorrectly defined
E. None of these
Answer» C. CMOS battery is nearing end of life
181.

What are the four key functions of a computer system?

A. input, processing, output, and storage
B. keyboard, display, memory, and disk drive
C. word processing, spreadsheets, database, calculations
D. bits, bytes, words, and OSI
E. None of these
Answer» A. input, processing, output, and storage
182.

Parity is :

A. a byte stored in the FAT to indicated remaining slots
B. the optimal transmission speed of data over a CAT 5 cable
C. an extra bit stored with data in RAM that is used to check for errors when the data is read back
D. the optimal transmission speed of data over a CAT 5 cable
E. None of these
Answer» C. an extra bit stored with data in RAM that is used to check for errors when the data is read back
183.

What is different between AT and ATX power supplies?

A. They are identical except for their shape.
B. AT supplies use a single P1 power connector while ATX uses P8 and P9
C. AT supplies use P8 and P9 power connectors while ATX uses a single P1 connector.
D. AT power supplies run on 120V AC current while ATX uses 220V AC
E. None of these
Answer» C. AT supplies use P8 and P9 power connectors while ATX uses a single P1 connector.
184.

What type of connector is used to plug a telephone line into a modem?

A. COM1
B. RJ-11
C. RJ-45
D. RJ-10
E. None of these
Answer» B. RJ-11
185.

Which of the following is NOT a type of computer hard drive?

A. IDE
B. FDD
C. SCSI
D. EIDE
E. SATA
Answer» B. FDD
186.

What does FDISK do?

A. performs low-level formatting of the hard drive
B. fixes bad sectors on the hard drive
C. recovers lost clusters on the hard drive
D. creates partitions on the hard drive
E. None of these
Answer» D. creates partitions on the hard drive
187.

Which of the following is NOT a type of motherboard expansion slot?

A. ISA
B. PCI
C. AGP
D. ATX
E. None of these
Answer» D. ATX
188.

Copying a process from memory to disk to allow space for other processes is called :

A. Swapping
B. Deadlock
C. Demand Paging
D. Page Fault
E. None of these
Answer» A. Swapping
189.

Which of the following memory unit that processor can access more rapidly :

A. Main Memory
B. Virtual Memory
C. Cache Memory
D. Read Only Memory
E. None of these
Answer» C. Cache Memory
190.

Which one of the following is not the function of Operating System?

A. Resource Management
B. File Management
C. Networking
D. Processor Management
E. None of these
Answer» C. Networking
191.

What is the meaning of “Hibernate” in Windows XP/Windows7?

A. Restart the Computer is safe mode
B. Restart the Computer in hibernate mode
C. Shutdown the Computer terminating all the running applications
D. Shutdown the Computer without closing the running applications
E. None of these
Answer» D. Shutdown the Computer without closing the running applications
192.

Unix Operating System is an :

A. Multi User Operating System
B. Time Sharing Operating System
C. Multi Tasking Operating System
D. All of these
E. None of these
Answer» D. All of these
193.

What should be the extension to execute files?

A. EXE
B. BAT
C. COM
D. All of these
E. None of these
Answer» D. All of these
194.

Which of the following memories need refresh?

A. SRAM
B. DRAM
C. COM
D. All of these
E. None of these
Answer» B. DRAM
195.

RJ45 UTP cable has………Cable :

A. 2 pair
B. 3 pair
C. 4 pair
D. 5 pair
E. None of these
Answer» C. 4 pair
196.

Basic is……….language :

A. a procedural
B. an object oriented
C. user friendly
D. both A and B
E. None of these
Answer» A. a procedural
197.

The file system “NTFS” stands for :

A. New Type File System
B. Never Terminated File System
C. New Technology File System
D. Non Terminated File System
E. None of these
Answer» C. New Technology File System
198.

Which Operating System doesn’t support networking between computers?

A. Windows 3.1
B. Windows 95
C. Windows 2000
D. Windows NT
E. Windows XP
Answer» A. Windows 3.1
199.

In which type of the following OS, the response time is very crucial :

A. Network Operating System
B. Real Time Operating System
C. Batch Operating System
D. Unix Operating System
E. None of these
Answer» B. Real Time Operating System
200.

Which of the following languages is more suited to structured program?

A. PL/1
B. FORTRAN
C. BASIC
D. PASCAL
E. None of these
Answer» D. PASCAL
Tags
Question and answers in Important Computer MCQs For Competitive Exams part-1, Important Computer MCQs For Competitive Exams part-1 multiple choice questions and answers, Important Computer MCQs For Competitive Exams part-1 Important MCQs, Solved MCQs for Important Computer MCQs For Competitive Exams part-1, Important Computer MCQs For Competitive Exams part-1 MCQs with answers PDF download